2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2016
DOI: 10.1109/hst.2016.7495585
|View full text |Cite
|
Sign up to set email alerts
|

IP core protection using voltage-controlled side-channel receivers

Abstract: This paper presents a new method for protecting netlist-based Intellectual Property (IP) cores in FPGAs by actively using voltage-controlled side-channel receivers. The receivers are realized by modulating the supply voltage of the chip, while at the same time detecting these changes from within the chip using a ring oscillator. The levels of the supply voltage can be determined by constantly monitoring the frequency of the ring oscillator.To prove authorship of an IP core, the verifier authenticates himself t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Finally, the same phenomenon can be exploited to watermark circuits [5,27], or introduce a no-contact debugging mechanism, for instance to detect stuck signals, without altering routing.…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, the same phenomenon can be exploited to watermark circuits [5,27], or introduce a no-contact debugging mechanism, for instance to detect stuck signals, without altering routing.…”
Section: Motivationmentioning
confidence: 99%
“…Research on side-and covert-channels on FPGAs and other embedded devices has primarily focused on communications between the device and the outside world. Techniques include varying the power consumption of a device and measuring the impulse response [37], changing how much Electromagnetic Interference is emitted by the device [3], or, in the other direction of communication, measuring voltage [27] and temperature changes [31]. These side-channels can be employed in the context of creating Hardware Trojans (HTs) [19], or as ways to watermark circuits and offer IP protection [5,27].…”
Section: Related Workmentioning
confidence: 99%